National Conference on Recent Trends in Computer Science and Engineering |
Foundation of Computer Science USA |
MEDHA2015 - Number 1 |
June 2015 |
Authors: Khushboo R. Shrote, Pushpanjali Chouragade |
09d06fc7-7d60-4f05-8ceb-fd5bdb0a5d7d |
Khushboo R. Shrote, Pushpanjali Chouragade . A Review Paper for Storage and Computation on Enterprise Data in the Cloud. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 1 (June 2015), 6-7.
Cloud computing provides way to share information. This Information is secured at cloud ends only. Any third party intruder may hack confidential information. While outsourcing its business-critical data and computations to the cloud, an enterprise loses control over them. How should the organization decide what security measures to apply to protect its data and computations that have different security requirements from a Cloud Service Provider (CSP) with an unknown level of corruption? The answer relies on the organization's perception about the CSP's trustworthiness and the security requirements of its data. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps an organization to derive such perceptions from knowledgeable and trusted employee roles and based on that, choose the most relevant security policy specifying the security measures necessary for outsourcing data and computations to the cloud.